Select Page

Healthcare’s Guide to Vulnerability Management

What Do Healthcare Leaders Think about Vulnerability Management?

Healthcare organizations are under mounting pressure to manage cybersecurity vulnerabilities across an increasingly complex technology ecosystem. Traditional IT environments now coexist with cloud platforms, cyber-physical systems, and thousands of network-connected medical devices—many of which were never designed with modern cybersecurity threats in mind. 

CHIME Insights  

To better understand how healthcare leaders are managing this reality, members of the College of Healthcare Information Management Executives (CHIME) recently participated in a survey focused on vulnerability management across IT and medical/IoT environments. Their responses reveal both progress and persistent gaps—and point clearly to the need for a more unified approach. The data below reflect the survey results conducted by CHIME.  

Respondents included CIOs, CISOs, clinical and digital leaders from ambulatory organizations, and large multi-hospital systems.

    Vulnerability management is an enterprise risk issue, not just an IT function

    How respondents summarized their sentiment on vulnerability management

    The Healthcare Cyber Risk Landscape

    Healthcare organizations manage vulnerabilities across a rapidly expanding ecosystem:

          • IT infrastructure
          • Cloud environments
          • Cyber-physical systems
          • Connected medical devices

    Many technologies were not built for today’s threat landscape—creating risk to patient safety, operations, and compliance.

    Top Vulnerability Management Challenges

    Healthcare leaders report:

          • Limited budget and staffing
          • Outdated or unsupported systems
          • High volumes of vulnerabilities
          • Difficulty prioritizing risk
          • Patch testing and deployment delays

    The imbalance: vulnerabilities are discovered faster than they can be remediated.

    Scanning Alone Isn’t Enough

    Most organizations scan:

          • Weekly
          • Quarterly
          • Continuously

    Reality:
    More scanning does not equal less risk if findings aren’t actionable or aligned with clinical constraints.

    The Biggest Gap: IT & Medical Devices

    Only 36% have fully integrated vulnerability programs.

    Key barriers:

          • Medical device patching limitations
          • No unified asset inventory
          • IT and clinical engineering silos
          • Limited remediation resources

    Confidence Is Cautious

          • 84% are somewhat confident
          • Only 8% are very confident

    Programs may work under normal conditions—but are stressed by zero-days, ransomware, and urgent disclosures.

    What Will Close the Gap

    Healthcare leaders say prioritizing these actions will improve outcomes

          • Look to create a single, unified asset inventory
          • Unify vulnerability management with tools spanning IT and medical devices
          • Create a formal cross-department governance to educate on risk and risk remediation actions
          • This problem is not declining, so find a way to optimize and increase remediation resource effectiveness
          • Collectively work for greater vendor accountability

    Navigating a Path Forward with a Program

    Healthcare organizations are under mounting pressure to manage cybersecurity vulnerabilities across an increasingly complex technology ecosystem. Traditional IT environments now coexist with cloud platforms, cyber-physical systems, and thousands of network-connected medical devices—many of which were never designed with modern cybersecurity threats in mind. 

    The CHIME findings highlight a dangerous imbalance. Healthcare organizations are discovering vulnerabilities faster than they can reasonably assess or remediate them—especially when clinical constraints limit patching or downtime. Traditional scan-and-patch models struggle in environments where patient care cannot be interrupted. 

    The CHIME survey makes one thing clear: healthcare organizations understand the risk—but need help operationalizing solutions at scale. Vulnerability management must evolve from a reactive, resource-draining process into a proactive, continuously improving risk management program.

    Status Quo Can’t Keep Up with Vulnerability Exploitation  

     

    Common Vulnerabilities and Exposures (CVE) Growth

    Published CVEs rose by roughly 20% from 2024 to 2025, expanding the attack surface and increasing the workload for vulnerability management teams.

    This increase reflects broader disclosure participation, expanded CNA coverage, and backlog reductions in scoring pipelines. Counts may vary due to withdrawn CVEs and NVD timing differences.

    CVE Numbering Authority (CNA) Growth

    CVE Numbering Authorities (CNAs) are approved organizations that assign CVE IDs within defined technology scopes. In 2025, the global CNA community grew by approximately 6%, expanding vulnerability coverage and accelerating disclosure across vendors and platforms.

     

     

    Known Exploited Vulnerability (KEV) Growth 

    Known Exploited Vulnerabilities (KEVs) are software and hardware flaws that the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has confirmed are actively being used in real-world attacks. Between 2024 and 2025, the KEV catalog expanded by approximately 20%, underscoring the growing pace of proven exploitation.

    Clearwater Advisory

    AI-Driven Vulnerability Discovery

    This signals a structural shift in vulnerability discovery. AI models are finding and enabling the exploitation of software flaws faster than human teams can respond.

    Read the Details

    Vulnerability Management Trend Report for Healthcare

    Which Vulnerabilities Pose the Highest Risk?

    How am I doing compared to other like healthcare businesses?

    What’s the current trend for Critical vulnerabilities?

    Vulnerability Management across the healthcare industry is fraught with complexity exacerbated by a landscape of changing exposure risk. Healthcare data, innovation, and patient care availability are all at risk when vulnerabilities can be exploited. 

    Not all types of organizations across the healthcare ecosystem are the same. Clearwater’s report is the first of its kind that breaks down the trends broken out by healthcare market segments.

    View the ups and downs of how healthcare organizations deal with all vulnerabilities month by month. Critical vulnerability finding trends show how these contribute to the running exposure risk in healthcare.

    Healthcare environments create a vast attack surface that requires constant risk
    management. Cyberattacks targeting sensitive health data, aiming to disrupt patient
    care or infiltrate a healthcare supply chain, rely on vulnerability exposures to facilitate
    their tactics. Security leaders in healthcare are keen to know where they stand as
    compared to like organizations when it comes to vulnerability management, whether it is
    performed in-house or with a managed security service provider (MSSP).

    Ready to get serious about vulnerability exposure risk?

     

     

    Discover the exact action plan your team needs to stay ahead of a rapidly evolving threat landscape. Clearwater’s Unified Vulnerability Management program, give your organization continuous management, with the best technology and healthcare expertise, driving down risk and staying ahead of threats.

     

     

    Clearwater’s Unified Vulnerability Management Program

    • Unified visibility across IT, MedTech, and cyber-physical systems helps reduce operational complexity and fragmented risk management
    • Vulnerability prioritization is guided by healthcare expertise and an understanding of patient care and clinical operational risk
    • 24/7 monitoring and expert guidance help teams stay ahead of emerging threats without placing additional burden on internal resources
    • We work alongside your team with practical remediation recommendations and risk-mitigating actions to help strengthen resilience and reduce exposure

    Move beyond fragmented controls toward a more resilient, defensible, and patient-centered security posture with Clearwater Managed Security Services.

    Reference

    Vulnerability Management Requirements

    Across Compliance Standards

    Every compliance and regulatory guide for healthcare organizations has a vulnerability management requirement, yet vulnerability risk continues to grow. Here is a recap of the security and compliance frameworks and how they provide guidance for vulnerability management.  

    Common Requirements Across All Standards and Guidelines:

      • Vulnerability identification 
      • Risk-based prioritization 
      • Timely remediation or mitigation 
      • Ongoing monitoring 
      • Documented governance 

    Compliance Standards and References to Vulnerability Management

    HIPAA (Security Rule) 

    Requirement
    Identify, assess, and reduce risks to ePHI. 

    References 

    • 45 CFR §164.308(a)(1)(ii)(A) – Risk Analysis 
    • 45 CFR §164.308(a)(1)(ii)(B) – Risk Management 
    • 45 CFR §164.308(a)(5)(ii)(B) – Malicious Software 
    • 45 CFR §164.308(a)(8) – Evaluation 

    HITECH Act 

    Requirement
    Prevent and reduce breach exposure through reasonable safeguards. 

    References 

    • §13402 – Breach Notification 
    • §13404 – Business Associate Liability 
    • §13411–13412 – Enforcement & Penalties 

    CMMC 

    Requirement
    Scan, track, and remediate system vulnerabilities. 

    References 

    • RA.1.001 – Identify Vulnerabilities 
    • RA.2.143 – Scan & Remediate 
    • RA.3.144 – Risk Analysis 
    • SI.2.145 – Flaw Remediation 

    HHS 405(d) (HICP) 

    Requirement
    Healthcare-specific vulnerability management best practices. 

    References 

    • Practice #2 – Vulnerability Management 

    HITRUST CSF 

    Requirement
    Formal, documented vulnerability management program. 

    References 

    • 10.1 – Technical Vulnerability Management 
    • 09.2 – Risk Management 
    • 01.a – Asset Inventory 

    SOC 2 (Trust Services Criteria) 

    Requirement
    Identify, monitor, and remediate security vulnerabilities. 

    References 

    • CC3.2 – Risk Identification 
    • CC4.1 – Monitoring 
    • CC7.1 – Vulnerability Detection 
    • CC7.2 – Security Monitoring 

    PCI DSS 4.0 

    Requirements 

    • Emphasizes continuous risk assessment and targeted risk analysis rather than only periodic checks. 
    • Introduces greater flexibility in how requirements are met, but raises evidence and testing expectations. 
    • Makes explicit the need to define remediation timelines based on risk and to document compensating controls when chosen. 

    References 

    • Requirement 6.1 – Identify security vulnerabilities and assign a risk ranking. 
    • Requirement 6.2 – Ensure systems are protected from known vulnerabilities by installing applicable vendor-supplied security patches in a timely manner. 
    • Requirement 6.3.1 (PCI DSS 4.0) – Perform targeted risk analysis to determine remediation timelines. 
    • Requirement 6.4 – Follow change-control processes for system and application changes (includes testing and validation). 
    • Requirement 11.2.1 – Quarterly internal vulnerability scans. 
    • Requirement 11.2.2 – Quarterly external vulnerability scans by an Approved Scanning Vendor (ASV). 
    • Requirement 11.2.3 – Re-scan after remediation to validate fixes. 
    • Requirement 11.5 – File integrity monitoring (to detect unauthorized changes/exploitation). 
    • Requirement 12.3.1 – Defined roles and responsibilities for security (supports accountable remediation processes).